Vulnerability

Code Rules in Vulnerability category

Category Severity Name Description
Vulnerability Critical SHA-1 and Message-Digest hash algorithms should not be used in secure contexts SHA-1 and Message-Digest hash algorithms should not be used in secure contexts